A user reports that their Instagram account has been compromised and is being used to post spam. What is the first step you should take in the Case Identification Process?
Confirm whether the account was actually hacked using the Comp Classifier or manual investigation in Activity Timeline
What is the role of 'Login Challenges' in the system?
To challenge suspicious logins
An agent can only pause the chat when you are expecting a response from the user and it has been 6 minutes since their last message to them.
True
Where is the shrimp's heart located?
In their head
Pink Ladies and Granny Smiths are what types of fruit?
Apples
What is the purpose of the 'Checkpoint Framework'?
To put temporary restrictions on an account
Which resolution action should be taken for a hacked and disabled Facebook account?
Run Secure User Account (SUA) action, then Reactivate or Unenroll from checkpoint
Movement & expression are some of the tips for detecting Suspicious Videos.
True
What are the colors of the rainbow?
Red,orange,yellow, green, blue, indigo
What is contagious but not a cold?
A yawn
When is it appropriate to request a new secure email from the user?
For hacked or lost contact point cases where the user no longer has access to existing contact points
Which of the following is authentication challenge for 'Last Resort Recovery'?
ID Verification
Location, Change in email, Phone, Name, Change in behavior, Password changes, enabling 2FA are not all signs of Compromise
False
What is the shortest sentence?
I am
What can you break on your body if you sneeze too hard?
Ribs
What does the 'Hacked Cleanup' process involve?
Removing vulnerabilities and reversing unauthorized changes
What is the main goal of 'Enable Recovery and Remediation'?
To authenticate and give access back to the user
80% or more of the total PIPs include the SAME real human face (same real human face defined by face match, include group PIPs)
False
Why do people say "bless you" when you sneeze?
Because your heart stops
What is the process of adding yeast to dough to create carbon dioxide bubbles?
Fermentation
When recovering a user account and they refuse to provide a new secure email what should we do?
Close chat as "non-compliance"
During the authentication process, a user successfully answers 2 out of 3 Knowledge-Based Authentication (KBA) questions. What does this result in?
The user passes the Ownership Check.
We use the signal information section to review an account with multiple suspicious login attempts from different countries.
False
What is the only food that doesn't spoil?
Honey
What part of the body has the tiniest bone?
Ear